Reverse-shell as a tool for gaining unauthorized access
DOI: 10.31673/2409-7292.2022.013437
DOI:
https://doi.org/10.31673/2409-7292.2022.013437Abstract
This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the "victim" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.
Keywords: cyberattack, attacker, malware, script, unauthorized access, shell.
References
1. What is a Reverse Shell? [Електронний ресурс] – Режим доступу до ресурсу: https://www.techslang.com/definition/what-is-a-reverse-shell/
2. Windows-php-reverse-shell [Електронний ресурс] – Режим доступу до ресурсу: https://github.com/Dhayalanb/windows-php-reverse-shell
3. Metasploit [Електронний ресурс] – Режим доступу до ресурсу: https://docs.rapid7.com/metasploit/
4. Php-reverse-shell [Електронний ресурс] – Режим доступу до ресурсу:https://pentestmonkey.net/tools/web-shells/php-reverse-shell